Author: Michael K. Reiter

Publication Overview

Publication period start: 2011
Number of co-authors: 22

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Reiter, Michael K., Rohatgi, Pankaj (2004): Homeland Security. In IEEE Internet Computing, 8 (6) pp. 16-17. https://doi.ieeecomputersociety.org/10.1109/MIC.2004.62
Reiter, Michael K. (1999): High-Confidence Distributed Systems - Guest Editor\'s Introduction. In IEEE Internet Computing, 3 (6) pp. 52-54.
Reiter, Michael K., Rubin, Aviel D. (1999): Anonymous Web Transactions with Crowds. In Communications of the ACM, 42 (2) pp. 32-38. https://dl.acm.org/doi/10.1145/293411.293778
Reiter, Michael K. (1996): Distributed Trust with the Rampart Toolkit. In Communications of the ACM, 39 (4) pp. 71-74.
Bauer, Lujo, Cranor, Lorrie Faith, Reeder, Robert W., Reiter, Michael K., Vaniea, Kami (2008): A user study of policy creation in a flexible access-control system. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 543-552. https://doi.acm.org/10.1145/1357054.1357143
Reeder, Robert W., Bauer, Lujo, Cranor, Lorrie Faith, Reiter, Michael K., Bacon, Kelli, How, Keisha, Strong, Heather (2008): Expandable grids for visualizing and authoring computer security policies. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 1473-1482. https://doi.acm.org/10.1145/1357054.1357285
Bauer, Lujo, Cranor, Lorrie Faith, Reiter, Michael K., Vaniea, Kami (2007): Lessons learned from the deployment of a smartphone-based access-control system. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 64-75. https://cups.cs.cmu.edu/soups/2007/proceedings/p64_bauer.pdf
Bauer, Lujo, Cranor, Lorrie Faith, Reeder, Robert W., Reiter, Michael K., Vaniea, Kami (2009): Real life challenges in access-control management. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 899-908. https://doi.acm.org/10.1145/1518701.1518838
Mazurek, Michelle L., Arsenault, J. P., Bresee, Joanna, Gupta, Nitin, Ion, Iulia, Johns, Christina, Lee, Daniel, Liang, Yuan, Olsen, Jenny, Salmon, Brandon, Shay, Richard, Vaniea, Kami, Bauer, Lujo, Cranor, Lorrie Faith, Ganger, Gregory R., Reiter, Michael K. (2010): Access control for home data sharing: evaluating social acceptability. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 645-654. https://doi.acm.org/10.1145/1753326.1753421
Reeder, Robert W., Bauer, Lujo, Cranor, Lorrie F., Reiter, Michael K., Vaniea, Kami (2011): More than skin deep: measuring effects of the underlying model on access-control system us. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2065-2074. https://dx.doi.org/10.1145/1978942.1979243
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Join 326,035+ designers who get one powerful email each week. Learn to design a life you love.

Next email in
1
day
10
hrs
4
mins
20
secs

Free forever. No spam. Unsubscribe anytime.